Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.196.48.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;182.196.48.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 00:12:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 69.48.196.182.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.48.196.182.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.54.52.35 attack
2020-08-03T11:30:10.348334mail.standpoint.com.ua sshd[31638]: Failed password for root from 106.54.52.35 port 50452 ssh2
2020-08-03T11:32:28.260772mail.standpoint.com.ua sshd[31953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.52.35  user=root
2020-08-03T11:32:30.668402mail.standpoint.com.ua sshd[31953]: Failed password for root from 106.54.52.35 port 46266 ssh2
2020-08-03T11:34:43.841885mail.standpoint.com.ua sshd[32230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.52.35  user=root
2020-08-03T11:34:45.782999mail.standpoint.com.ua sshd[32230]: Failed password for root from 106.54.52.35 port 42082 ssh2
...
2020-08-03 20:14:49
192.241.249.226 attack
$f2bV_matches
2020-08-03 19:59:26
31.43.223.196 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-03 19:53:58
199.19.226.115 attackbots
 TCP (SYN) 199.19.226.115:34486 -> port 554, len 44
2020-08-03 19:47:20
51.91.111.136 attackbots
2020-08-03T13:15:44.869595vps773228.ovh.net sshd[1682]: Failed password for invalid user devops from 51.91.111.136 port 45662 ssh2
2020-08-03T13:15:52.370151vps773228.ovh.net sshd[1684]: Invalid user devops from 51.91.111.136 port 55378
2020-08-03T13:15:52.379928vps773228.ovh.net sshd[1684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-38bc867b.vps.ovh.net
2020-08-03T13:15:52.370151vps773228.ovh.net sshd[1684]: Invalid user devops from 51.91.111.136 port 55378
2020-08-03T13:15:54.384339vps773228.ovh.net sshd[1684]: Failed password for invalid user devops from 51.91.111.136 port 55378 ssh2
...
2020-08-03 19:54:55
159.89.174.226 attackbots
Multiple SSH authentication failures from 159.89.174.226
2020-08-03 20:03:45
113.87.162.99 attack
Lines containing failures of 113.87.162.99
Aug  3 05:39:30 shared04 sshd[8886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.162.99  user=r.r
Aug  3 05:39:32 shared04 sshd[8886]: Failed password for r.r from 113.87.162.99 port 37232 ssh2
Aug  3 05:39:32 shared04 sshd[8886]: Received disconnect from 113.87.162.99 port 37232:11: Bye Bye [preauth]
Aug  3 05:39:32 shared04 sshd[8886]: Disconnected from authenticating user r.r 113.87.162.99 port 37232 [preauth]
Aug  3 05:45:35 shared04 sshd[11251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.87.162.99  user=r.r
Aug  3 05:45:36 shared04 sshd[11251]: Failed password for r.r from 113.87.162.99 port 15238 ssh2
Aug  3 05:45:37 shared04 sshd[11251]: Received disconnect from 113.87.162.99 port 15238:11: Bye Bye [preauth]
Aug  3 05:45:37 shared04 sshd[11251]: Disconnected from authenticating user r.r 113.87.162.99 port 15238 [preauth]


........
------------------------------
2020-08-03 19:56:18
35.229.64.137 attack
WordPress XMLRPC scan :: 35.229.64.137 1.920 - [03/Aug/2020:03:48:10  0000] www.[censored_1] "POST //xmlrpc.php HTTP/1.1" 503 18229 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" "HTTP/1.1"
2020-08-03 20:02:12
106.12.201.16 attackbotsspam
2020-08-03T09:25:18.428823randservbullet-proofcloud-66.localdomain sshd[21251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.201.16  user=root
2020-08-03T09:25:20.690312randservbullet-proofcloud-66.localdomain sshd[21251]: Failed password for root from 106.12.201.16 port 52300 ssh2
2020-08-03T09:42:05.360511randservbullet-proofcloud-66.localdomain sshd[21381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.201.16  user=root
2020-08-03T09:42:06.864363randservbullet-proofcloud-66.localdomain sshd[21381]: Failed password for root from 106.12.201.16 port 46554 ssh2
...
2020-08-03 20:04:52
188.19.119.4 attack
20/8/3@00:48:16: FAIL: Alarm-Network address from=188.19.119.4
20/8/3@00:48:16: FAIL: Alarm-Network address from=188.19.119.4
...
2020-08-03 20:04:29
189.39.102.67 attackspam
Aug  3 05:34:58 master sshd[23288]: Failed password for root from 189.39.102.67 port 49122 ssh2
Aug  3 05:42:49 master sshd[23458]: Failed password for root from 189.39.102.67 port 51958 ssh2
Aug  3 05:48:20 master sshd[23522]: Failed password for root from 189.39.102.67 port 36272 ssh2
Aug  3 05:53:22 master sshd[23612]: Failed password for root from 189.39.102.67 port 48818 ssh2
Aug  3 05:58:32 master sshd[23665]: Failed password for root from 189.39.102.67 port 33146 ssh2
Aug  3 06:03:31 master sshd[24135]: Failed password for root from 189.39.102.67 port 45694 ssh2
Aug  3 06:08:39 master sshd[24190]: Failed password for root from 189.39.102.67 port 58256 ssh2
Aug  3 06:13:42 master sshd[24323]: Failed password for root from 189.39.102.67 port 42598 ssh2
Aug  3 06:18:49 master sshd[24390]: Failed password for root from 189.39.102.67 port 55148 ssh2
Aug  3 06:28:56 master sshd[24750]: Failed password for root from 189.39.102.67 port 52022 ssh2
2020-08-03 20:13:21
51.91.125.195 attack
$f2bV_matches
2020-08-03 20:16:44
49.233.128.229 attackbots
Aug  3 12:59:02 h1745522 sshd[22428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.128.229  user=root
Aug  3 12:59:02 h1745522 sshd[22428]: Failed password for root from 49.233.128.229 port 54528 ssh2
Aug  3 13:01:02 h1745522 sshd[23826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.128.229  user=root
Aug  3 13:01:04 h1745522 sshd[23826]: Failed password for root from 49.233.128.229 port 52624 ssh2
Aug  3 13:03:40 h1745522 sshd[23961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.128.229  user=root
Aug  3 13:03:42 h1745522 sshd[23961]: Failed password for root from 49.233.128.229 port 50720 ssh2
Aug  3 13:06:13 h1745522 sshd[24122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.128.229  user=root
Aug  3 13:06:15 h1745522 sshd[24122]: Failed password for root from 49.233.128.229 port 48816 s
...
2020-08-03 20:01:44
103.125.218.203 attack
Sending spam emails with phishing URL inside the emails.
2020-08-03 19:49:20
62.234.80.115 attackspambots
2020-08-03 13:59:08,113 fail2ban.actions: WARNING [ssh] Ban 62.234.80.115
2020-08-03 20:05:24

Recently Reported IPs

200.217.223.199 239.96.144.52 226.32.253.101 205.175.195.164
56.245.18.249 60.87.18.94 138.10.233.77 244.15.126.19
32.246.6.152 245.74.80.222 5.185.252.15 168.122.50.6
163.253.98.220 92.114.235.141 48.219.146.117 87.238.195.42
135.220.227.100 176.61.224.119 175.190.242.198 242.52.87.156